// artifact family
wireless / wifi controller forensics
10 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.
tools in this family
ordered as in the forensics catalog. every tool runs locally — no upload, no account.
- cisco wlc syslog forensic analyzerdrop cisco wlc syslog export · parse ap + client + roam event · runs locally
- aruba central audit log forensic analyzerdrop aruba central audit export · parse site + device + admin action · runs locally
- ruckus smartzone event log forensic analyzerdrop ruckus smartzone event export · parse ap + client + wlan event · runs locally
- meraki wireless event log forensic analyzerdrop meraki wireless event export · parse ssid + client + device · runs locally
- ubiquiti unifi controller log forensic analyzerdrop unifi controller log export · parse ap + client + firewall rule · runs locally
- rogue access point detectordrop wifi scan export · detect unauthorized bssids + ssid spoof · runs locally
- wifi deauth flood anomaly detectordrop wlan deauth event export · detect burst deauth storms · runs locally
- wireless client roam timeline correlatordrop 2+ wlan client logs · unified roam path graph · runs locally
- captive portal auth anomaly detectordrop hotspot portal auth log · detect credential stuffing bursts · runs locally
- multi controller wlan inventory correlatordrop 2+ wlan controller exports · correlate ap + bssid overlap · runs locally